Home
last modified time | relevance | path

Searched full:jumped (Results 1 – 25 of 37) sorted by relevance

12

/linux/drivers/rtc/
H A Drtc-at91sam9.c156 /* time jumped backwards, increase time until alarm */ in at91_rtc_settime()
159 /* time jumped forwards, decrease time until alarm */ in at91_rtc_settime()
162 /* time jumped past the alarm, disable alarm */ in at91_rtc_settime()
/linux/Documentation/devicetree/bindings/soc/loongson/
H A Dloongson,ls2k-pmc.yaml35 RAM) firmware entry address which was jumped from kernel and it's
/linux/arch/x86/kernel/
H A Drethook.c28 ANNOTATE_NOENDBR /* This is only jumped from ret instruction */
/linux/arch/nios2/kernel/
H A Dhead.S59 * First executable code - detected and jumped to by the ROM bootstrap
/linux/arch/arc/kernel/
H A Dhead.S94 ; Default Reset Handler (jumped into from Reset vector)
/linux/Documentation/arch/powerpc/
H A Dbootwrapper.rst68 can be loaded to any location in RAM and jumped to.
/linux/arch/powerpc/kvm/
H A Dbook3s_interrupts.S130 * This is the handler in module memory. It gets jumped at from the
/linux/drivers/net/ethernet/i825xx/
H A Dlasi_82596.c6 but there were too many hoops which HP wants jumped through to
/linux/arch/m68k/ifpsp060/
H A DTEST.DOC92 routine would simply execute a "bsr" or "jsr" that jumped to the selected
H A Disp.doc105 would simply execute a "bra" or "jmp" that jumped to the selected function
H A Dfpsp.doc97 would simply execute a "bra" or "jmp" that jumped to the selected function
/linux/drivers/scsi/sym53c8xx_2/
H A Dsym_hipd.h447 * SCRIPTS address jumped by SCRIPTS on reselection.
545 u32 start; /* Jumped by SCRIPTS after selection */
546 u32 restart; /* Jumped by SCRIPTS on relection */
/linux/arch/sh/kernel/
H A Dentry-common.S9 ! to be jumped is too far, but it causes illegal slot exception.
/linux/fs/
H A Dnamei.c1468 static int __traverse_mounts(struct path *path, unsigned flags, bool *jumped, in __traverse_mounts() argument
1525 *jumped = need_mntput; in __traverse_mounts()
1529 static inline int traverse_mounts(struct path *path, bool *jumped, in traverse_mounts() argument
1536 *jumped = false; in traverse_mounts()
1541 return __traverse_mounts(path, flags, jumped, count, lookup_flags); in traverse_mounts()
1568 bool jumped; in follow_down() local
1569 int ret = traverse_mounts(path, &jumped, NULL, flags); in follow_down()
1628 bool jumped; in handle_mounts() local
1644 ret = traverse_mounts(path, &jumped, &nd->total_link_count, nd->flags); in handle_mounts()
1645 if (jumped) in handle_mounts()
[all …]
/linux/drivers/hid/
H A Dhid-udraw-ps3.c188 * to user-space otherwise it'll look as if it jumped. in udraw_raw_event()
/linux/fs/ecryptfs/
H A Dmiscdev.c250 /* Something else jumped in since the in ecryptfs_miscdev_read()
/linux/arch/sh/kernel/cpu/sh3/
H A Dentry.S20 ! to be jumped is too far, but it causes illegal slot exception.
/linux/drivers/net/can/usb/etas_es58x/
H A Des581_4.c81 netdev_err(netdev, "Echo packet idx jumped from %u to %u\n", in es581_4_echo_msg()
H A Des58x_fd.c85 netdev_err(netdev, "Packet idx jumped from %u to %u\n", in es58x_fd_echo_msg()
/linux/lib/
H A Dassoc_array.c198 jumped: in assoc_array_walk()
233 goto jumped; in assoc_array_walk()
285 goto jumped; in assoc_array_walk()
/linux/arch/powerpc/kernel/
H A Dhead_book3s_32.S87 * This is jumped to on prep systems right after the kernel is relocated
748 * This code is jumped to from the startup code to copy
/linux/net/core/
H A Dfib_rules.c322 jumped: in fib_rules_lookup()
334 goto jumped; in fib_rules_lookup()
/linux/arch/xtensa/kernel/
H A Dvectors.S198 * a0: last address before we jumped to the unrecoverable_exception.
/linux/fs/afs/
H A Dinode.c341 /* Only update the size if the data version jumped. If the in afs_apply_status()
/linux/fs/netfs/
H A Dfscache_cookie.c713 /* The QUIESCENT state is jumped to the LOOKING_UP state by in fscache_cookie_state_machine()

12